Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Texas A&M University" +contributor:("Reddy, Narasimha"). Showing records 1 – 30 of 59 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Texas A&M University

1. Morrison, Corey Casey. Network Optimizations for Distributed Storage Networks.

Degree: MS, Computer Engineering, 2016, Texas A&M University

 Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance… (more)

Subjects/Keywords: Distributed File Systems; Regenerating Codes; OpenFlow; Networking; Storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morrison, C. C. (2016). Network Optimizations for Distributed Storage Networks. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/174278

Chicago Manual of Style (16th Edition):

Morrison, Corey Casey. “Network Optimizations for Distributed Storage Networks.” 2016. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/174278.

MLA Handbook (7th Edition):

Morrison, Corey Casey. “Network Optimizations for Distributed Storage Networks.” 2016. Web. 26 Oct 2020.

Vancouver:

Morrison CC. Network Optimizations for Distributed Storage Networks. [Internet] [Masters thesis]. Texas A&M University; 2016. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/174278.

Council of Science Editors:

Morrison CC. Network Optimizations for Distributed Storage Networks. [Masters Thesis]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/174278


Texas A&M University

2. Wang, Daoqi. Design, Conformance Verification, and Performance Evaluation of OpenFlow Message Layer.

Degree: MS, Computer Engineering, 2014, Texas A&M University

 The message layer is a critical part of a network protocol stack. The quality of the protocol implementation is closely tied to that of the… (more)

Subjects/Keywords: OpenFlow; Network Protocol; Message Layer; Conformance; Performance; Design Choices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, D. (2014). Design, Conformance Verification, and Performance Evaluation of OpenFlow Message Layer. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/152852

Chicago Manual of Style (16th Edition):

Wang, Daoqi. “Design, Conformance Verification, and Performance Evaluation of OpenFlow Message Layer.” 2014. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/152852.

MLA Handbook (7th Edition):

Wang, Daoqi. “Design, Conformance Verification, and Performance Evaluation of OpenFlow Message Layer.” 2014. Web. 26 Oct 2020.

Vancouver:

Wang D. Design, Conformance Verification, and Performance Evaluation of OpenFlow Message Layer. [Internet] [Masters thesis]. Texas A&M University; 2014. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/152852.

Council of Science Editors:

Wang D. Design, Conformance Verification, and Performance Evaluation of OpenFlow Message Layer. [Masters Thesis]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/152852


Texas A&M University

3. Huang, Bolun. Sentiment-based Classification of Tweeters and University Programs.

Degree: MS, Computer Engineering, 2014, Texas A&M University

 The rapidly growing World WideWeb (WWW) is no longer a passive information provider. Nowadays, Internet users themselves have become contributors to the WWW. A lot… (more)

Subjects/Keywords: Sentiment; Classification; Twitter; University Ranking; Algorithm; hiring graph

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, B. (2014). Sentiment-based Classification of Tweeters and University Programs. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/153569

Chicago Manual of Style (16th Edition):

Huang, Bolun. “Sentiment-based Classification of Tweeters and University Programs.” 2014. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/153569.

MLA Handbook (7th Edition):

Huang, Bolun. “Sentiment-based Classification of Tweeters and University Programs.” 2014. Web. 26 Oct 2020.

Vancouver:

Huang B. Sentiment-based Classification of Tweeters and University Programs. [Internet] [Masters thesis]. Texas A&M University; 2014. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/153569.

Council of Science Editors:

Huang B. Sentiment-based Classification of Tweeters and University Programs. [Masters Thesis]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/153569


Texas A&M University

4. Zhuo, Yue. IRLstack 3.0: High-Performance Windows Sockets.

Degree: MS, Computer Science, 2014, Texas A&M University

 With the ever-growing volume and speed of Internet traffic, network applications place higher demand on packet I/O rates. Although 1-Gbps and even 10-Gbps Ethernet are… (more)

Subjects/Keywords: network driver; socket; windows; high-performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhuo, Y. (2014). IRLstack 3.0: High-Performance Windows Sockets. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/154001

Chicago Manual of Style (16th Edition):

Zhuo, Yue. “IRLstack 3.0: High-Performance Windows Sockets.” 2014. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/154001.

MLA Handbook (7th Edition):

Zhuo, Yue. “IRLstack 3.0: High-Performance Windows Sockets.” 2014. Web. 26 Oct 2020.

Vancouver:

Zhuo Y. IRLstack 3.0: High-Performance Windows Sockets. [Internet] [Masters thesis]. Texas A&M University; 2014. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/154001.

Council of Science Editors:

Zhuo Y. IRLstack 3.0: High-Performance Windows Sockets. [Masters Thesis]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/154001


Texas A&M University

5. Shin, Seung Won. Protecting Networked Systems from Malware Threats.

Degree: PhD, Computer Engineering, 2013, Texas A&M University

 Currently, networks and networked systems are essential media for us to communicate with other people, access resources, and share information. Reading (or sending) emails, navigating… (more)

Subjects/Keywords: Network Security; Software Defined Networking Security; Botnet Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shin, S. W. (2013). Protecting Networked Systems from Malware Threats. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/151219

Chicago Manual of Style (16th Edition):

Shin, Seung Won. “Protecting Networked Systems from Malware Threats.” 2013. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/151219.

MLA Handbook (7th Edition):

Shin, Seung Won. “Protecting Networked Systems from Malware Threats.” 2013. Web. 26 Oct 2020.

Vancouver:

Shin SW. Protecting Networked Systems from Malware Threats. [Internet] [Doctoral dissertation]. Texas A&M University; 2013. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/151219.

Council of Science Editors:

Shin SW. Protecting Networked Systems from Malware Threats. [Doctoral Dissertation]. Texas A&M University; 2013. Available from: http://hdl.handle.net/1969.1/151219


Texas A&M University

6. Amble, Meghana Mukund. Content-aware Caching and Traffic Management in Content Distribution Networks.

Degree: MS, Electrical Engineering, 2012, Texas A&M University

 The rapid increase of content delivery over the Internet has lead to the proliferation of content distribution networks (CDNs). Management of CDNs requires algorithms for… (more)

Subjects/Keywords: Content Distribution Networks; caching; content placement; eviction; routing; joint solution; algorithms; design; eviction cost; throughput-optimality; delays

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amble, M. M. (2012). Content-aware Caching and Traffic Management in Content Distribution Networks. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8587

Chicago Manual of Style (16th Edition):

Amble, Meghana Mukund. “Content-aware Caching and Traffic Management in Content Distribution Networks.” 2012. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8587.

MLA Handbook (7th Edition):

Amble, Meghana Mukund. “Content-aware Caching and Traffic Management in Content Distribution Networks.” 2012. Web. 26 Oct 2020.

Vancouver:

Amble MM. Content-aware Caching and Traffic Management in Content Distribution Networks. [Internet] [Masters thesis]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8587.

Council of Science Editors:

Amble MM. Content-aware Caching and Traffic Management in Content Distribution Networks. [Masters Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8587


Texas A&M University

7. Li, Xiaoyong. Distributed Synchronization Under Data Churn.

Degree: PhD, Computer Science, 2016, Texas A&M University

 Nowadays an increasing number of applications need to maintain local copies of remote data sources to provide services to their users. Because of the dynamic… (more)

Subjects/Keywords: data synchronization; freshness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, X. (2016). Distributed Synchronization Under Data Churn. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/157023

Chicago Manual of Style (16th Edition):

Li, Xiaoyong. “Distributed Synchronization Under Data Churn.” 2016. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/157023.

MLA Handbook (7th Edition):

Li, Xiaoyong. “Distributed Synchronization Under Data Churn.” 2016. Web. 26 Oct 2020.

Vancouver:

Li X. Distributed Synchronization Under Data Churn. [Internet] [Doctoral dissertation]. Texas A&M University; 2016. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/157023.

Council of Science Editors:

Li X. Distributed Synchronization Under Data Churn. [Doctoral Dissertation]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/157023


Texas A&M University

8. Thothathri, Visvanathan. MAFIA: Malicious Facebook Page Identification.

Degree: MS, Computer Engineering, 2016, Texas A&M University

 Facebook has been a host to many different attack vectors, such as malicious apps that use their permissions to spread malware and compromise user accounts… (more)

Subjects/Keywords: Security; Social Networks; Facebook; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thothathri, V. (2016). MAFIA: Malicious Facebook Page Identification. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/158701

Chicago Manual of Style (16th Edition):

Thothathri, Visvanathan. “MAFIA: Malicious Facebook Page Identification.” 2016. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/158701.

MLA Handbook (7th Edition):

Thothathri, Visvanathan. “MAFIA: Malicious Facebook Page Identification.” 2016. Web. 26 Oct 2020.

Vancouver:

Thothathri V. MAFIA: Malicious Facebook Page Identification. [Internet] [Masters thesis]. Texas A&M University; 2016. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/158701.

Council of Science Editors:

Thothathri V. MAFIA: Malicious Facebook Page Identification. [Masters Thesis]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/158701


Texas A&M University

9. Zhang, Jialong. Understanding and Detecting Malicious Cyber Infrastructures.

Degree: PhD, Computer Engineering, 2016, Texas A&M University

 Malware (e.g., trojans, bots, and spyware) is still a pervasive threat on the Internet. It is able to infect computer systems to further launch a… (more)

Subjects/Keywords: malicious cyber infrastructure; network security; malicious server detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, J. (2016). Understanding and Detecting Malicious Cyber Infrastructures. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/158989

Chicago Manual of Style (16th Edition):

Zhang, Jialong. “Understanding and Detecting Malicious Cyber Infrastructures.” 2016. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/158989.

MLA Handbook (7th Edition):

Zhang, Jialong. “Understanding and Detecting Malicious Cyber Infrastructures.” 2016. Web. 26 Oct 2020.

Vancouver:

Zhang J. Understanding and Detecting Malicious Cyber Infrastructures. [Internet] [Doctoral dissertation]. Texas A&M University; 2016. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/158989.

Council of Science Editors:

Zhang J. Understanding and Detecting Malicious Cyber Infrastructures. [Doctoral Dissertation]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/158989


Texas A&M University

10. Fatehi, Ehsan. ILP and TLP in Shared Memory Applications: A Limit Study.

Degree: PhD, Computer Engineering, 2015, Texas A&M University

 The work in this dissertation explores the limits of Chip-multiprocessors (CMPs) with respect to shared-memory, multi-threaded benchmarks, which will help aid in identifying microarchitectural bottlenecks.… (more)

Subjects/Keywords: instruction-level parallelism; limits parallelism; concurrency pthreads; thread-level parallelism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fatehi, E. (2015). ILP and TLP in Shared Memory Applications: A Limit Study. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/155119

Chicago Manual of Style (16th Edition):

Fatehi, Ehsan. “ILP and TLP in Shared Memory Applications: A Limit Study.” 2015. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/155119.

MLA Handbook (7th Edition):

Fatehi, Ehsan. “ILP and TLP in Shared Memory Applications: A Limit Study.” 2015. Web. 26 Oct 2020.

Vancouver:

Fatehi E. ILP and TLP in Shared Memory Applications: A Limit Study. [Internet] [Doctoral dissertation]. Texas A&M University; 2015. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/155119.

Council of Science Editors:

Fatehi E. ILP and TLP in Shared Memory Applications: A Limit Study. [Doctoral Dissertation]. Texas A&M University; 2015. Available from: http://hdl.handle.net/1969.1/155119


Texas A&M University

11. Shamsi, Zain Sarfaraz. Scalable OS Fingerprinting: Classification Problems and Applications.

Degree: PhD, Computer Science, 2017, Texas A&M University

 The Internet has become ubiquitous in our lives today. With its rapid adoption and widespread growth across the planet, it has drawn many research efforts… (more)

Subjects/Keywords: OS fingerprinting; Internet measurement; network security; classification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shamsi, Z. S. (2017). Scalable OS Fingerprinting: Classification Problems and Applications. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/161371

Chicago Manual of Style (16th Edition):

Shamsi, Zain Sarfaraz. “Scalable OS Fingerprinting: Classification Problems and Applications.” 2017. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/161371.

MLA Handbook (7th Edition):

Shamsi, Zain Sarfaraz. “Scalable OS Fingerprinting: Classification Problems and Applications.” 2017. Web. 26 Oct 2020.

Vancouver:

Shamsi ZS. Scalable OS Fingerprinting: Classification Problems and Applications. [Internet] [Doctoral dissertation]. Texas A&M University; 2017. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/161371.

Council of Science Editors:

Shamsi ZS. Scalable OS Fingerprinting: Classification Problems and Applications. [Doctoral Dissertation]. Texas A&M University; 2017. Available from: http://hdl.handle.net/1969.1/161371


Texas A&M University

12. Ramaswamy Pillai, Vinod. Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks.

Degree: PhD, Computer Engineering, 2013, Texas A&M University

 Recent years there has been a growing interest in the study of distributed control mechanisms for use in communication networks. A fundamental assumption in these… (more)

Subjects/Keywords: Game theory; Congestion control; P2P systems; Wireless networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramaswamy Pillai, V. (2013). Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/151656

Chicago Manual of Style (16th Edition):

Ramaswamy Pillai, Vinod. “Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks.” 2013. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/151656.

MLA Handbook (7th Edition):

Ramaswamy Pillai, Vinod. “Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks.” 2013. Web. 26 Oct 2020.

Vancouver:

Ramaswamy Pillai V. Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks. [Internet] [Doctoral dissertation]. Texas A&M University; 2013. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/151656.

Council of Science Editors:

Ramaswamy Pillai V. Applications of Game Theory to Multi-Agent Coordination Problems in Communication Networks. [Doctoral Dissertation]. Texas A&M University; 2013. Available from: http://hdl.handle.net/1969.1/151656


Texas A&M University

13. Abedini, Navid. Achieving Quality of Service Guarantees for Delay Sensitive Applications in Wireless Networks.

Degree: PhD, Computer Engineering, 2012, Texas A&M University

 In the past few years, we have witnessed the continuous growth in popularity of delay-sensitive applications. Applications like live video streaming, multimedia conferencing, VoIP and… (more)

Subjects/Keywords: Wireless communications; delay-sensitive; quality of service; content distribution; queueing; relay networks; Markov decision process; peer-to-peer networks; media streaming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abedini, N. (2012). Achieving Quality of Service Guarantees for Delay Sensitive Applications in Wireless Networks. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11671

Chicago Manual of Style (16th Edition):

Abedini, Navid. “Achieving Quality of Service Guarantees for Delay Sensitive Applications in Wireless Networks.” 2012. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11671.

MLA Handbook (7th Edition):

Abedini, Navid. “Achieving Quality of Service Guarantees for Delay Sensitive Applications in Wireless Networks.” 2012. Web. 26 Oct 2020.

Vancouver:

Abedini N. Achieving Quality of Service Guarantees for Delay Sensitive Applications in Wireless Networks. [Internet] [Doctoral dissertation]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11671.

Council of Science Editors:

Abedini N. Achieving Quality of Service Guarantees for Delay Sensitive Applications in Wireless Networks. [Doctoral Dissertation]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11671

14. Das, Dibakar. Power-Aware Routing in Networks.

Degree: MS, Computer Engineering, 2012, Texas A&M University

 The objective of this work is to develop a scheme to minimize a combination of power consumption and congestion delay in communication networks. I model… (more)

Subjects/Keywords: Population games; Concave optimization; Weighted Shapley Value

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Das, D. (2012). Power-Aware Routing in Networks. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10154

Chicago Manual of Style (16th Edition):

Das, Dibakar. “Power-Aware Routing in Networks.” 2012. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10154.

MLA Handbook (7th Edition):

Das, Dibakar. “Power-Aware Routing in Networks.” 2012. Web. 26 Oct 2020.

Vancouver:

Das D. Power-Aware Routing in Networks. [Internet] [Masters thesis]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10154.

Council of Science Editors:

Das D. Power-Aware Routing in Networks. [Masters Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10154

15. Yang, Guangliang. When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps.

Degree: PhD, Computer Science, 2019, Texas A&M University

 Nowadays, mobile app developers are enjoying the benefits of the amalgamation of web and mobile platforms. Developers can easily and smoothly integrate all sorts of… (more)

Subjects/Keywords: Android Security; WebView Security; Event-Oriented Exploits; Differential Context Vulnerabilities; Origin Stripping Vulnerabilities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, G. (2019). When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/186192

Chicago Manual of Style (16th Edition):

Yang, Guangliang. “When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps.” 2019. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/186192.

MLA Handbook (7th Edition):

Yang, Guangliang. “When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps.” 2019. Web. 26 Oct 2020.

Vancouver:

Yang G. When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps. [Internet] [Doctoral dissertation]. Texas A&M University; 2019. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/186192.

Council of Science Editors:

Yang G. When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps. [Doctoral Dissertation]. Texas A&M University; 2019. Available from: http://hdl.handle.net/1969.1/186192

16. Leonard, Derek Anthony. Algorithms for Large-Scale Internet Measurements.

Degree: PhD, Computer Science, 2012, Texas A&M University

 As the Internet has grown in size and importance to society, it has become increasingly difficult to generate global metrics of interest that can be… (more)

Subjects/Keywords: Distance Estimation; Horizontal Scanning; Service Discovery; Intrusion Detection Systems; Internet Measurements

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Leonard, D. A. (2012). Algorithms for Large-Scale Internet Measurements. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8651

Chicago Manual of Style (16th Edition):

Leonard, Derek Anthony. “Algorithms for Large-Scale Internet Measurements.” 2012. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8651.

MLA Handbook (7th Edition):

Leonard, Derek Anthony. “Algorithms for Large-Scale Internet Measurements.” 2012. Web. 26 Oct 2020.

Vancouver:

Leonard DA. Algorithms for Large-Scale Internet Measurements. [Internet] [Doctoral dissertation]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8651.

Council of Science Editors:

Leonard DA. Algorithms for Large-Scale Internet Measurements. [Doctoral Dissertation]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8651

17. Ramasamy, Solairaja. Delay-aware Scheduling in Wireless Coding Networks: To Wait or Not to Wait.

Degree: MS, Computer Engineering, 2012, Texas A&M University

 Wireless technology has become an increasingly popular way to gain network access. Wireless networks are expected to provide efficient and reliable service and support a… (more)

Subjects/Keywords: wireless networks; network coding; reverse carpooling; markov decision process; distributed controller; relay node; scheduling; tradefoff; queueing delay

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramasamy, S. (2012). Delay-aware Scheduling in Wireless Coding Networks: To Wait or Not to Wait. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8989

Chicago Manual of Style (16th Edition):

Ramasamy, Solairaja. “Delay-aware Scheduling in Wireless Coding Networks: To Wait or Not to Wait.” 2012. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8989.

MLA Handbook (7th Edition):

Ramasamy, Solairaja. “Delay-aware Scheduling in Wireless Coding Networks: To Wait or Not to Wait.” 2012. Web. 26 Oct 2020.

Vancouver:

Ramasamy S. Delay-aware Scheduling in Wireless Coding Networks: To Wait or Not to Wait. [Internet] [Masters thesis]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8989.

Council of Science Editors:

Ramasamy S. Delay-aware Scheduling in Wireless Coding Networks: To Wait or Not to Wait. [Masters Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8989

18. Yadav, Sandeep 1985-. Scalable Techniques for Anomaly Detection.

Degree: PhD, Computer Engineering, 2012, Texas A&M University

 Computer networks are constantly being attacked by malicious entities for various reasons. Network based attacks include but are not limited to, Distributed Denial of Service… (more)

Subjects/Keywords: scalable techniques; belief propagation; fluxing; botnets; dns; anomaly detection

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yadav, S. 1. (2012). Scalable Techniques for Anomaly Detection. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/148330

Chicago Manual of Style (16th Edition):

Yadav, Sandeep 1985-. “Scalable Techniques for Anomaly Detection.” 2012. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/148330.

MLA Handbook (7th Edition):

Yadav, Sandeep 1985-. “Scalable Techniques for Anomaly Detection.” 2012. Web. 26 Oct 2020.

Vancouver:

Yadav S1. Scalable Techniques for Anomaly Detection. [Internet] [Doctoral dissertation]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/148330.

Council of Science Editors:

Yadav S1. Scalable Techniques for Anomaly Detection. [Doctoral Dissertation]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/148330

19. Harris, Amanda Lynne. Design of Controllers for a Multiple Input Multiple Output System.

Degree: PhD, Electrical Engineering, 2012, Texas A&M University

 A method of controller design for multiple input multiple output (MIMO) system is needed that will not give the high order controllers of modern control… (more)

Subjects/Keywords: multiple input multiple output; MIMO; fixed order controller; controller design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harris, A. L. (2012). Design of Controllers for a Multiple Input Multiple Output System. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-11104

Chicago Manual of Style (16th Edition):

Harris, Amanda Lynne. “Design of Controllers for a Multiple Input Multiple Output System.” 2012. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-11104.

MLA Handbook (7th Edition):

Harris, Amanda Lynne. “Design of Controllers for a Multiple Input Multiple Output System.” 2012. Web. 26 Oct 2020.

Vancouver:

Harris AL. Design of Controllers for a Multiple Input Multiple Output System. [Internet] [Doctoral dissertation]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-11104.

Council of Science Editors:

Harris AL. Design of Controllers for a Multiple Input Multiple Output System. [Doctoral Dissertation]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-11104

20. Lai, Chien-An. Flash Memory Garbage Collection in Hard Real-Time Systems.

Degree: MS, Computer Science, 2012, Texas A&M University

 Due to advances in capacity, speed, and economics, NAND-based flash memory technology is increasingly integrated into all types of computing systems, ranging from enterprise servers… (more)

Subjects/Keywords: real-time systems; flash memory; garbage collection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, C. (2012). Flash Memory Garbage Collection in Hard Real-Time Systems. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10195

Chicago Manual of Style (16th Edition):

Lai, Chien-An. “Flash Memory Garbage Collection in Hard Real-Time Systems.” 2012. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10195.

MLA Handbook (7th Edition):

Lai, Chien-An. “Flash Memory Garbage Collection in Hard Real-Time Systems.” 2012. Web. 26 Oct 2020.

Vancouver:

Lai C. Flash Memory Garbage Collection in Hard Real-Time Systems. [Internet] [Masters thesis]. Texas A&M University; 2012. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10195.

Council of Science Editors:

Lai C. Flash Memory Garbage Collection in Hard Real-Time Systems. [Masters Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2011-08-10195

21. Ruia, Ayush. Virtualization of Non-Volatile Ram.

Degree: MS, Computer Engineering, 2015, Texas A&M University

 Virtualization technology is powering today's cloud industry. Virtualization inserts a software layer, the hypervisor, below the Operating System, to manage multiple OS environments simultaneously. Offering… (more)

Subjects/Keywords: virtualization; non-volatile RAM; SCM; XEN; hypervisor; VMM; MMU; non-volatile memory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ruia, A. (2015). Virtualization of Non-Volatile Ram. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/154981

Chicago Manual of Style (16th Edition):

Ruia, Ayush. “Virtualization of Non-Volatile Ram.” 2015. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/154981.

MLA Handbook (7th Edition):

Ruia, Ayush. “Virtualization of Non-Volatile Ram.” 2015. Web. 26 Oct 2020.

Vancouver:

Ruia A. Virtualization of Non-Volatile Ram. [Internet] [Masters thesis]. Texas A&M University; 2015. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/154981.

Council of Science Editors:

Ruia A. Virtualization of Non-Volatile Ram. [Masters Thesis]. Texas A&M University; 2015. Available from: http://hdl.handle.net/1969.1/154981

22. Chen, Chien-An. Towards Energy-Efficient, Fault-Tolerant, and Load-Balanced Mobile Cloud.

Degree: PhD, Computer Engineering, 2015, Texas A&M University

 Recent advances in mobile technologies have enabled a new computing paradigm in which large amounts of data are generated and accessed from mobile devices. However,… (more)

Subjects/Keywords: Mobile Cloud; Mobile Computing; k-out-of-n; Distributed data storage; Distributed data processing; energy-efficient; fault-tolerant; load-balanced

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, C. (2015). Towards Energy-Efficient, Fault-Tolerant, and Load-Balanced Mobile Cloud. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/156297

Chicago Manual of Style (16th Edition):

Chen, Chien-An. “Towards Energy-Efficient, Fault-Tolerant, and Load-Balanced Mobile Cloud.” 2015. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/156297.

MLA Handbook (7th Edition):

Chen, Chien-An. “Towards Energy-Efficient, Fault-Tolerant, and Load-Balanced Mobile Cloud.” 2015. Web. 26 Oct 2020.

Vancouver:

Chen C. Towards Energy-Efficient, Fault-Tolerant, and Load-Balanced Mobile Cloud. [Internet] [Doctoral dissertation]. Texas A&M University; 2015. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/156297.

Council of Science Editors:

Chen C. Towards Energy-Efficient, Fault-Tolerant, and Load-Balanced Mobile Cloud. [Doctoral Dissertation]. Texas A&M University; 2015. Available from: http://hdl.handle.net/1969.1/156297

23. Madala, Sriharsha. Capacity Approaching Strategies for the Uncoordinated Gaussian Multiple Access Channel.

Degree: MS, Electrical Engineering, 2014, Texas A&M University

 The Gaussian Multiple access channel (GMAC) is a well-studied multi user channel in information theory and communication theory. The capacity of the GMAC can be… (more)

Subjects/Keywords: GMAC; Uncoordinated multiple access; ICR; slotted aloha; AWGN; Uncoordinated rate selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Madala, S. (2014). Capacity Approaching Strategies for the Uncoordinated Gaussian Multiple Access Channel. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/154147

Chicago Manual of Style (16th Edition):

Madala, Sriharsha. “Capacity Approaching Strategies for the Uncoordinated Gaussian Multiple Access Channel.” 2014. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/154147.

MLA Handbook (7th Edition):

Madala, Sriharsha. “Capacity Approaching Strategies for the Uncoordinated Gaussian Multiple Access Channel.” 2014. Web. 26 Oct 2020.

Vancouver:

Madala S. Capacity Approaching Strategies for the Uncoordinated Gaussian Multiple Access Channel. [Internet] [Masters thesis]. Texas A&M University; 2014. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/154147.

Council of Science Editors:

Madala S. Capacity Approaching Strategies for the Uncoordinated Gaussian Multiple Access Channel. [Masters Thesis]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/154147

24. Bose, Pradipta. Storageflow: An SDN Approach to Storage Networks.

Degree: MS, Computer Engineering, 2014, Texas A&M University

 Network Attached Storage (NAS) systems have become popular due to their efficiency, ease of use, and ability to protect and restore data. Many NAS implementations… (more)

Subjects/Keywords: SDN; NAS; OpenFlow; Storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bose, P. (2014). Storageflow: An SDN Approach to Storage Networks. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/153662

Chicago Manual of Style (16th Edition):

Bose, Pradipta. “Storageflow: An SDN Approach to Storage Networks.” 2014. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/153662.

MLA Handbook (7th Edition):

Bose, Pradipta. “Storageflow: An SDN Approach to Storage Networks.” 2014. Web. 26 Oct 2020.

Vancouver:

Bose P. Storageflow: An SDN Approach to Storage Networks. [Internet] [Masters thesis]. Texas A&M University; 2014. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/153662.

Council of Science Editors:

Bose P. Storageflow: An SDN Approach to Storage Networks. [Masters Thesis]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/153662

25. Yang, Guangliang. When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps.

Degree: PhD, Computer Science, 2019, Texas A&M University

 Nowadays, mobile app developers are enjoying the benefits of the amalgamation of web and mobile platforms. Developers can easily and smoothly integrate all sorts of… (more)

Subjects/Keywords: Android Security; WebView Security; Event-Oriented Exploits; Differential Context Vulnerabilities; Origin Stripping Vulnerabilities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, G. (2019). When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/186232

Chicago Manual of Style (16th Edition):

Yang, Guangliang. “When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps.” 2019. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/186232.

MLA Handbook (7th Edition):

Yang, Guangliang. “When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps.” 2019. Web. 26 Oct 2020.

Vancouver:

Yang G. When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps. [Internet] [Doctoral dissertation]. Texas A&M University; 2019. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/186232.

Council of Science Editors:

Yang G. When Web Meets Mobile: Novel Security Threats and Defenses in Web/Mobile Hybrid Apps. [Doctoral Dissertation]. Texas A&M University; 2019. Available from: http://hdl.handle.net/1969.1/186232

26. Yu, Wei. On countermeasures of worm attacks over the Internet.

Degree: PhD, Computer Engineering, 2009, Texas A&M University

 Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service… (more)

Subjects/Keywords: Worm Attacks; Countermeasures

Page 1 Page 2 Page 3 Page 4 Page 5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, W. (2009). On countermeasures of worm attacks over the Internet. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2669

Chicago Manual of Style (16th Edition):

Yu, Wei. “On countermeasures of worm attacks over the Internet.” 2009. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2669.

MLA Handbook (7th Edition):

Yu, Wei. “On countermeasures of worm attacks over the Internet.” 2009. Web. 26 Oct 2020.

Vancouver:

Yu W. On countermeasures of worm attacks over the Internet. [Internet] [Doctoral dissertation]. Texas A&M University; 2009. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2669.

Council of Science Editors:

Yu W. On countermeasures of worm attacks over the Internet. [Doctoral Dissertation]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2669

27. Cao, Guangtong. Distributed services for mobile ad hoc networks.

Degree: PhD, Computer Science, 2005, Texas A&M University

 A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile… (more)

Subjects/Keywords: mobile ad hoc network; distributed services; clock synchronization; connected dominating set; k-mutual exclusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cao, G. (2005). Distributed services for mobile ad hoc networks. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/2541

Chicago Manual of Style (16th Edition):

Cao, Guangtong. “Distributed services for mobile ad hoc networks.” 2005. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/2541.

MLA Handbook (7th Edition):

Cao, Guangtong. “Distributed services for mobile ad hoc networks.” 2005. Web. 26 Oct 2020.

Vancouver:

Cao G. Distributed services for mobile ad hoc networks. [Internet] [Doctoral dissertation]. Texas A&M University; 2005. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/2541.

Council of Science Editors:

Cao G. Distributed services for mobile ad hoc networks. [Doctoral Dissertation]. Texas A&M University; 2005. Available from: http://hdl.handle.net/1969.1/2541

28. Jung, Eun-Sun. Energy efficiency in wireless networks.

Degree: PhD, Computer Science, 2005, Texas A&M University

 Energy is a critical resource in the design of wireless networks since wireless devices are usually powered by batteries. Battery capacity is finite and the… (more)

Subjects/Keywords: energy efficiency; wireless network; power saving mode; power control

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jung, E. (2005). Energy efficiency in wireless networks. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/2718

Chicago Manual of Style (16th Edition):

Jung, Eun-Sun. “Energy efficiency in wireless networks.” 2005. Doctoral Dissertation, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/2718.

MLA Handbook (7th Edition):

Jung, Eun-Sun. “Energy efficiency in wireless networks.” 2005. Web. 26 Oct 2020.

Vancouver:

Jung E. Energy efficiency in wireless networks. [Internet] [Doctoral dissertation]. Texas A&M University; 2005. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/2718.

Council of Science Editors:

Jung E. Energy efficiency in wireless networks. [Doctoral Dissertation]. Texas A&M University; 2005. Available from: http://hdl.handle.net/1969.1/2718

29. Patel, Kunal S. Dispatch: distributed peer-to-peer simulations.

Degree: MS, Computer Science, 2009, Texas A&M University

 Recently there has been an increasing demand for efficient mechanisms of carrying out computations that exhibit coarse grained parallelism. Examples of this class of problems… (more)

Subjects/Keywords: Peer-to-Peer Systems; cycle-sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patel, K. S. (2009). Dispatch: distributed peer-to-peer simulations. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2463

Chicago Manual of Style (16th Edition):

Patel, Kunal S. “Dispatch: distributed peer-to-peer simulations.” 2009. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2463.

MLA Handbook (7th Edition):

Patel, Kunal S. “Dispatch: distributed peer-to-peer simulations.” 2009. Web. 26 Oct 2020.

Vancouver:

Patel KS. Dispatch: distributed peer-to-peer simulations. [Internet] [Masters thesis]. Texas A&M University; 2009. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2463.

Council of Science Editors:

Patel KS. Dispatch: distributed peer-to-peer simulations. [Masters Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2463

30. Sari, Ilkay. Joint synchronization of clock phase offset, skew and drift in reference broadcast synchronization (RBS) protocol.

Degree: MS, Electrical Engineering, 2009, Texas A&M University

 Time-synchronization in wireless ad-hoc sensor networks is a crucial piece of infrastructure. Thus, it is a fundamental design problem to have a good clock syn-… (more)

Subjects/Keywords: Wireless Sensor Networks; Time Synchronization; Gibbs Sampler

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sari, I. (2009). Joint synchronization of clock phase offset, skew and drift in reference broadcast synchronization (RBS) protocol. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-1781

Chicago Manual of Style (16th Edition):

Sari, Ilkay. “Joint synchronization of clock phase offset, skew and drift in reference broadcast synchronization (RBS) protocol.” 2009. Masters Thesis, Texas A&M University. Accessed October 26, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-1781.

MLA Handbook (7th Edition):

Sari, Ilkay. “Joint synchronization of clock phase offset, skew and drift in reference broadcast synchronization (RBS) protocol.” 2009. Web. 26 Oct 2020.

Vancouver:

Sari I. Joint synchronization of clock phase offset, skew and drift in reference broadcast synchronization (RBS) protocol. [Internet] [Masters thesis]. Texas A&M University; 2009. [cited 2020 Oct 26]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-1781.

Council of Science Editors:

Sari I. Joint synchronization of clock phase offset, skew and drift in reference broadcast synchronization (RBS) protocol. [Masters Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-1781

[1] [2]

.